Building safer systems and applications is one of the main goals of
today’s programmers. It resulted in development of security audit and
risk monitoring methodologies. however, despite all those efforts, the
complexity of many processes creates weak spots, which become a
serious and costly problem for all users of computer networks.